Running SIP behind NAT Dr. Christian Stredicke, snom technology AG

Slides:



Advertisements
Similar presentations
Running SIP behind NAT Dr. Christian Stredicke, snom technology AG Paris, France, January 2002.
Advertisements

SIP, Firewalls and NATs Oh My!. SIP Summit SIP, Firewalls and NATs, Oh My! Getting SIP Through Firewalls Firewalls Typically.
Running SIP behind NAT Dr. Christian Stredicke, snom technology AG Tokyo, Japan, Oct 22 th 2002.
Phone Product Roadmap snom technology AG, November 2004.
NAT Traversal Panasonic Communications Co.,Ltd Office Network Company Network SE Team 2008 Feb 25 th.
January 23-26, 2007 Ft. Lauderdale, Florida An introduction to SIP Simon Millard Professional Services Manager Aculab.
Session Initiation Protocol Winelfred G. Pasamba.
Session Initiation Protocol (SIP) By: Zhixin Chen.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
RTSP NAT Traversal Update Magnus Westlund (Ericsson) Thomas Zeng (PVNS, an Alcatel company) IETF-60 MMUSIC WG draft-ietf-mmusic-rtsp-nat-03.txt.
CSc 461/561 CSc 461/561 Multimedia Systems Part C: 2. SIP.
SIP, NAT, Firewall SIP NAT Firewall How to Traversal NAT/Firewall for SIP.
SIP, Session Initiation Protocol Internet Draft, IETF, RFC 2543.
Introduction to SIP Speaker: Min-Hua Yang Advisor: Ho-Ting Wu Date:2005/3/29.
Via contains the address at which the originator is expecting to receive responses to this request. Mandatory To contains a display name and a SIP URI.
SIP and NAT Dr. Jonathan Rosenberg Cisco Fellow. What is NAT? Network Address Translation (NAT) –Creates address binding between internal private and.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Running SIP behind NAT Dr. Christian Stredicke, snom technology AG, Miami, USA, February 2002.
Running SIP behind NAT Dr. Christian Stredicke, snom technology AG, Voice Over Net, USA, April 2003.
RTP Relay Support in Intelligent Gateway Author: Pieere Pi
NAT Traversal Speaker: Chin-Chang Chang Date:
1 Integrating 3G and WLAN Services in NTP SIP-based VoIP Platform Dr. Quincy Wu National Telecommunications Program Office
1 Kommunikatsiooniteenuste arendus IRT0080 Loeng 4 Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Greg Van Dyne December 4, Agenda Introduction Technical Overview Protocols Demonstration Future Trends References.
Running SIP behind NAT Dr. Christian Stredicke, snom technology AG, Miami, USA, February 2002.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
Presented By Team Netgeeks SIP Session Initiation Protocol.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
SIP:Session Initiation Protocol Che-Yu Kuo Computer & Information Science Department University of Delaware May 11, 2010 CISC 856: TCP/IP and Upper Layer.
Simon Millard Professional Services Manager Aculab – booth 402 The State of SIP.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Making SIP NAT Friendly Jonathan Rosenberg dynamicsoft.
Interactive Connectivity Establishment : ICE
The Session Initiation Protocol - SIP
jitsi. org advanced real-time communication.
7: Multimedia Networking7-1 protocols for real-time interactive applications RTP, RTCP, SIP.
Johan Delimon 26/04/2016 BE-COM E-COMMUNICATIONS EVENT THE INNER WORKINGS OF SKYPE FOR BUSINESS: NETWORKING.
The SIP-Based System Used in Connection with a Firewall Peter Koski, Jorma Ylinen, Pekka Loula Tampere University of Technology, Pori Pohjoisranta 11 A,
HIP-Based NAT Traversal in P2P-Environments
Defining Network Infrastructure and Network Security Lesson 8.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Firewalls, Network Address Translators(NATs), and H.323
SIP AAI a possibility for TF-EMC2 and TF-ECS cooperation
Understand IPv6 Part 2 LESSON 3.3_B Networking Fundamentals.
Internet Service Providers and types of internet connections
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
NAT (Network Address Translation)
SIP over MANETs Introduction to SIP SIP vs MANETs Open Issues
CONNECTING TO THE INTERNET
Instructor Materials Chapter 9: Testing and Troubleshooting
Session Initiation Protocol (SIP)
Introduction to Networking
Working at a Small-to-Medium Business or ISP – Chapter 7
TCP/IP Networking An Example
NET323 D: Network Protocols
Working at a Small-to-Medium Business or ISP – Chapter 7
6.6 Firewalls Packet Filter (=filtering router)
* Essential Network Security Book Slides.
TCP/IP Networking An Example
Working at a Small-to-Medium Business or ISP – Chapter 7
NET323 D: Network Protocols
NAT Traversal for VoIP Dr. Quincy Wu National Chi Nan University
Firewalls Jiang Long Spring 2002.
دیواره ی آتش.
Proposal for a Generic Emergency Call Support
AbbottLink™ - IP Address Overview
SIP Basics Workshop Dennis Baron July 20, 2005.
Anup K.Talukdar B.R.Badrinath Arup Acharya
Computer Networks Protocols
Ingate & Dialogic Technical Presentation
Presentation transcript:

Running SIP behind NAT Dr. Christian Stredicke, snom technology AG Paris, France, January 2002

Overview 1 Problem Description 2 STUN: Using Legacy Equipment 3 TURN: Fixing Remaining Problems 4 UPnP: Remote Control for Routers 5 Application Layer Gateways 6 Remaining Problems & Solutions

Which information does a client has to set up for port forwarding in NAT equipment? Router needs information where to send packets in private network Map port to private address and port By default packets will be rejected or sent to DMZ Router needs hint for security checking Accept packets from any destination Accept packets only from associated host Accept packets only from associated host and port 123.123.123.123 192.168.0.1 Client Client Router

How did other applications solve the problem? HTTP, telnet, … Using TCP DNS, others “Digging holes”: Set up association when client sends out packet from unmapped port for 15-60 seconds Security policy hardwired by vendor Some offer a DNS proxy (application layer gateway) ftp Does not work! Inexperienced users use http instead Some routers offer applications layer gateway Heterogeneous environment Every vendor does it in a different way “Digging holes” is common denominator

snom STUN uses the digging hole trick to set up port associations Initialization procedure checks environment Goal: Check if STUN is needed Type of NAT does actually not really matter because user is not interested in failure reason SIP port kept alive by sending packets every 15-60 s RTP ports are allocated dynamically when starting a call Otherwise keep-alive traffic would be double RTCP port can not be allocated because next port allocation is unlikely Long ringing and putting caller on hold is problematic (no port refresh during this time)

In cases when NAT is symmetrical, TURN could be a solution 124.124.124.124 123.123.123.123 192.168.0.1 3. SIP/Media Client 2. Activate Request/Response 1. Allocate Request/Response Client STUN/TURN Server Router

TURN works in symmetrical NAT environment, but has too many problems Scalability TURN server becomes “media server” Every call generates about 50 packets per second Delay Sending packets over media server increases transport delay significantly E.g. local call in Tokyo when TURN server is in Frankfurt TURN specification Needs rework (activation message not defined)

UPnP is the right approach Generic protocol to allocate ports on router Works with SIP, can be used with other applications as well Can be integrated with firewalls Not too hard to implement Microsoft Messenger uses UPnP “De facto standard” Virtually all DSL router vendors offer UPnP now Problem: Old Equipment Use STUN Maybe use TURN, even if call duration is terrible Instruct customers to set up ports manually

With the increasing availability of UPnP, most home customers can be addressed 2002 2003 STUN STUN UPnP Software Updates New Equipment UPnP Illustrative

Application layer gateways (ALG) solve the problem in the business area Business customers have different requirements than home users Many phones Want to run proxies, media servers, application servers behind their firewall These applications probably will not have UPnP or STUN Therefore, firewalls will probably include SIP-aware ALG Sample SIP NAT ALG available from snom

Calling phones in the same network requires ancillary information 1a) Phone A sends to public address of B 1b) Router will not forward packet, call will fail 2) A knows B is in the same NAT and sends packet to private address instead

Ancillary information must be placed in contact URI and in SDP INVITE sip:info1@snomag.de SIP/2.0 Via: SIP/2.0/UDP 218.230.0.59:5060;branch=z9hG4bK-6rms4e9tmtsz Max-Forwards: 70 From: <sip:abc@snomag.de>;tag=16z5zw9lqt To: <sip:info1@snomag.de> Call-ID: 0000a4f95f24-zzt41v6ulesj@218.230.0.59 CSeq: 1 INVITE Contact: <sip:abc@218.230.0.59:5060;srcadr=192.168.0.4%3A5060;transport=udp;line=1> Content-Type: application/sdp Content-Length: 311 v=0 o=root 19211 19211 IN IP4 218.230.0.59 s=SIP Call c=IN IP4 218.230.0.59 t=0 0 m=audio 10004 RTP/AVP 0 101 a=rtpmap:0 pcmu/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-15 a=x-private:192.168.0.4:10004 218.230.0.59:10004

Multi-tier NAT requires a list of private addresses STUN 123.123.123.123 NAT1 When using STUN, a STUN server is required between the layers STUN 10.0.0.1 10.0.0.2 10.0.0.3 NAT2 NAT3 192.168.0.1 192.168.0.1 Phone A Phone B 192.168.0.2 192.168.0.2 A has three identities: 1. 192.168.0.2:5060 2. 10.0.0.2:1234 3. 123.123.123.123:5678 B has three identities: 1. 192.168.0.2:5060 2. 10.0.0.3:1234 3. 123.123.123.123:5679

How should a phone boot up? Try UPnP UPnP available No response (5 seconds) or not available Use UPnP This step can be done even without STUN, as the registrar returns the response quick Try to Register No problem: either public address, ALG or total private environment Registrar complains about private address Use STUN Use Given Identity

sip:info@snomag.de

© 2002 snom technology Aktiengesellschaft Written by: Dr. Christian Stredicke Version: 1.0 The author has made his best effort to prepare this document. The content is based upon latest information whenever possible. The author makes no representation or warranties of any kind with regard to the completeness or accuracy of the contents herein and accept no liability of any kind including but not limited to performance, merchantability, fitness for any particular purpose, or any losses or damages of any kind caused or alleged to be caused directly or indirectly from this document. For more information, mail info@snom.de, Pascalstr. 10E, 10587 Berlin, Germany.